Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Kimoon Jeong"'
Autor:
Nosin Ibna Mahbub, Md. Delowar Hossain, Sharmen Akhter, Md. Imtiaz Hossain, Kimoon Jeong, Eui-Nam Huh
Publikováno v:
IEEE Access, Vol 12, Pp 55248-55263 (2024)
Cloud computing has become the cornerstone of modern technology, propelling industries to unprecedented heights with its remarkable and recent advances. However, the fundamental challenge for cloud service providers is real-time workload prediction a
Externí odkaz:
https://doaj.org/article/cd8b235ef1fa432695f0f37707598146
Publikováno v:
Advances in Computer Science and Ubiquitous Computing ISBN: 9789811593420
In this work, we present an environment able to support users who perform big data analysis using distributed and parallel framework to web applications. JupyterHub and Jupyter Enterprise Gateway were used to develop user code in web environment, and
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::cbaa7f99e936a678c7412b4efe770f41
https://doi.org/10.1007/978-981-15-9343-7_58
https://doi.org/10.1007/978-981-15-9343-7_58
Publikováno v:
Internet and Distributed Computing Systems ISBN: 9783030349134
IDCS
IDCS
The intrinsic features of Internet networks lead to imbalanced class distributions when datasets are conformed, phenomena called Class Imbalance and that is attaching an increasing attention in many research fields. In spite of performance losses due
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_________::50c302172972baa7aabfe8e2ffc4c722
https://doi.org/10.1007/978-3-030-34914-1_29
https://doi.org/10.1007/978-3-030-34914-1_29
Publikováno v:
Journal of Information Processing Systems.
Web shells are programs that are written for a specific purpose in Web scripting languages, such as PHP, ASP, ASP.NET, JSP, PERL-CGI, etc. Web shells provide a means to communicate with the server's operating system via the interpreter of the web scr
Publikováno v:
NCM (2)
The high cost for information security incident response makes organizations hesitate to possess their own expert security team. Also organizations are still reluctant to share their own security circumstances with external organizations. By the way,
Publikováno v:
Journal of Information Processing Systems; Jun2015, Vol. 11 Issue 2, p229-238, 10p
Publikováno v:
2008 Fourth International Conference on Networked Computing & Advanced Information Management; 2008, p143-148, 6p